Cloud computing represents the most important shift in computing and information technology (IT). However, security and privacy remain the main obstacles to its widespread adoption. In this research we will review the security and privacy challenges that affect critical data in cloud computing and identify solutions that are used to address these challenges. Some questions that need answers are: (a) User access management, (b) Protect privacy of sensitive data, (c) Identity anonymity to protect the Identity of user and data file. To answer these questions, a systematic literature review was conducted and structured interview with several security experts working on cloud computing security to investigate the main objectives of propo
... Show MoreAbstract
The study seeks to use one of the techniques (Data mining) a (Logic regression) on the inherited risk through the use of style financial ratios technical analysis and then apply for financial fraud indicators,Since higher scandals exposed companies and the failure of the audit process has shocked the community and affected the integrity of the auditor and the reason is financial fraud practiced by the companies and not to the discovery of the fraud by the auditor, and this fraud involves intentional act aimed to achieve personal and harm the interests of to others, and doing (administration, staff) we can say that all frauds carried out through the presence of the motives and factors that help th
... Show MoreOne wide-ranging category of open source data is that referring to geospatial information web sites. Despite the advantages of such open source data, including ease of access and cost free data, there is a potential issue of its quality. This article tests the horizontal positional accuracy and possible integration of four web-derived geospatial datasets: OpenStreetMap (OSM), Google Map, Google Earth and Wikimapia. The evaluation was achieved by combining the tested information with reference field survey data for fifty road intersections in Baghdad, Iraq. The results indicate that the free geospatial data can be used to enhance authoritative maps especially small scale maps.
This research study Blur groups (Fuzzy Sets) which is the perception of the most modern in the application in various practical and theoretical areas and in various fields of life, was addressed to the fuzzy random variable whose value is not real, but the numbers Millbh because it expresses the mysterious phenomena or uncertain with measurements are not assertive. Fuzzy data were presented for binocular test and analysis of variance method of random Fuzzy variables , where this method depends on a number of assumptions, which is a problem that prevents the use of this method in the case of non-realized.
The great scientific progress has led to widespread Information as information accumulates in large databases is important in trying to revise and compile this vast amount of data and, where its purpose to extract hidden information or classified data under their relations with each other in order to take advantage of them for technical purposes.
And work with data mining (DM) is appropriate in this area because of the importance of research in the (K-Means) algorithm for clustering data in fact applied with effect can be observed in variables by changing the sample size (n) and the number of clusters (K)
... Show MoreAmong the metaheuristic algorithms, population-based algorithms are an explorative search algorithm superior to the local search algorithm in terms of exploring the search space to find globally optimal solutions. However, the primary downside of such algorithms is their low exploitative capability, which prevents the expansion of the search space neighborhood for more optimal solutions. The firefly algorithm (FA) is a population-based algorithm that has been widely used in clustering problems. However, FA is limited in terms of its premature convergence when no neighborhood search strategies are employed to improve the quality of clustering solutions in the neighborhood region and exploring the global regions in the search space. On the
... Show MoreStevia rebaudiana Bertoni contains diterpenoid steviol glycosides that have no adverse impact on blood sugar levels despite being 300 times sweeter than sugar. This study aimed to investigate the rate of callus induction from stevia leaves and the content of glycosides when changing the sucrose percentage in the culture medium.. Murashige and Skoog (MS) culture medium supported by 4.0 mg/l naphthalene acetic acid (NAA) and 1.0 mg/l benzyl adenine (BA) was used, and different concentrations of sucrose (2, 3, 4, 5 and 6%) were tested .The extraction of glycosides from leaf and callus tissues was performed by using methanol. Extracted glycosides were analyzed by high-performance liquid chromatography (HPLC). The results showed signific
... Show MoreFriction stir welding (FSW) process is an emerging solid state joining process in which the material that is being welded does not melt. This process uses a nonconsumable tool to generate frictional heat in the abutting surfaces. The welding parameters such as tool rotational speed, welding speed, axial force, etc., and tool pin profile play a major role in deciding the weld quality. In this investigation an attempt
has been made to understand the effect of tool pin profile and rotation diameter on microstructure and mechanical properties in aluminum alloy (2218-T72). Five different tool pin profiles (straight cylindrical, threaded cylindrical, triangular, square, and threaded cylindrical with flat), with three different rotation
d